Attack against Ibrahim's Distributed Key Generation for RSA
B.Brzezniak, L.Hanzlik, P.Kubiak, M.Kutylowski
Wroclaw University of Technology
Distributed RSA key generation protocols aim to generate RSA keys in such a way that
no single participant of the protocol can learn factorization of the RSA modulus.
In this note we show that two recent protocols of this kind (Journal of Network Security,
Vol.7, No.1, 2008, pp.106-113 and Vol.8, No.2, 2009, pp. 139-150) fail their security target.
We present an attack that can be launched by any protocol participant after terminating
distributed key generation process.
full text accepted for International Journal of Network Security